注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁出版圖書科學(xué)技術(shù)計算機(jī)/網(wǎng)絡(luò)信息安全防火墻技術(shù)指南(英文版)

防火墻技術(shù)指南(英文版)

防火墻技術(shù)指南(英文版)

定 價:¥105.00

作 者: M.Goncalves 著
出版社: 世界圖書出版公司
叢編項(xiàng):
標(biāo) 簽: 信息安全

ISBN: 9787506249713 出版時間: 2001-04-01 包裝: 平裝
開本: 大32開 頁數(shù): 678 字?jǐn)?shù):  

內(nèi)容簡介

  This book is aimed primarily at network, Web, systems, LAN, and WAN administrators. But it is also targeted at the new breed of professionals, the so-called Internet Managers, as well as to anyone in need of a complete reference book on firewalls. As you read this book, you will notice that what separates it from the others is that this book is comprehensive and gives the technical information necessary to understand, choose, install, maintain, and foresee future needs involving firewalls and security at a very informal level. It has a conversational style with practical information, tips, and cautions to help the Internet, network, and security administrator to cope, and "survive" their tasks and responsibilities.

作者簡介

暫缺《防火墻技術(shù)指南(英文版)》作者簡介

圖書目錄

Preface.
Acknowledgments
Part I Introducing TCP/IP and the Need for Security: Firewalls
Chapter 1 Internetworking Protocols and Standards: An Overview
Internet Protocol (IP)
User Oatagram Protocol (UDP)
Transmission Control Protocol (TCP)
Extending IP Addresses Through CIDR
Routing Information Protocol (RIP)
MBONE-The Multicast Backbone
Internet Control Message Protocol (ICMP)
Internet Group Management Protocol (IGMP)
Open Shortest-Path First (OSPF)
Border Gateway Protocol Version 4 (BGP-4)
Address Resolution Protocol
Simple Network Management Protocol (SNMP)
Watch Your ISP Connection
The Internet Protocol Next Generation or IPv6
Network Time Protocol (NTP)
Dynamic Host Configuration Protocol (DHCP)
Windows Sockets
Domain Name System(DNS)
Firewalls Concepts
Chapter 2 Basic Connectivity
What Happened to
What Is the Baudot Code?
UNIX to UNIX CoPy (UUCP)
SLIP and PPP
Rlogin
Virtual Terminal Protocol (Telnet)
Columbia University's Kermit: A Secure and Reliable
Telnet Server
Telnet Services Security Considerations
A Systems Manager Approach to Network Security
Telnet Session Security Checklist
Trivial File Transfer Protocol (TFTP)
TFTP Security Considerations
File Transfer Protocol (FTP)
Some of the Challenges of Using Firewalls
Increasing Security on IP Networks
Chapter 3 Cryptography: Is It Enough?
Introduction
Symmetric Key Encryption (Private Keys)
Data Encryption Standard (DES)
International Data Encryption Algorithm (IDEA)
CAST
Skipjack
RC2/RC4
Asymmetric Key Encryption/Public Key Encryption
RSA
Digital Signature Standard (DSS)
Message Digest Algorithms
MD2, MD4, and MD5
Secure Hash Standard/Secure Hash Algorithm
(SHS/SHA)
Certificates
Certificate Servers
Key Management
Kerberos
Key-Exchange Algorithms (KEA)
……
 Chapter 4 Firewalling Challenges:The Basic Web
Chapter 5 Firewalling Challenges:The Advanced Web
Chapter 6 The API's Security Holes and its Firewall
Part 2 Firewall Implementations and Limitations
Chapter 7 What is an Internet/Intranet Firewall After All?
Chapter 8 How Vulnerable Are Internet Services?
Chapter 9 Setting Up a Firewall Security Policy
Chapter 10 Putting It Together:Firewall Design and Implementation
Chapter 11 proxy Servers
Chapter 12 Firewall Maintenance
Chapter 13 Firewall Toolkits and Case Studies
Part 3 Firewall Resource Guide
Chapter 14 Types of Firewalls and Products on the Market
Appendix A List of Firewall Resellers and Related Tools
Glossary
Bibliography
Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號